Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/puppet@2.8
purl pkg:gem/puppet@2.8
Tags Ghost
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-3kma-3ffw-8qd9
Aliases:
CVE-2013-3567
GHSA-f7p5-w2cr-7cp7
Improper Input Validation Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
3.2.2
Affected by 16 other vulnerabilities.
VCID-5g6u-uvej-xbad
Aliases:
CVE-2013-4761
GHSA-cj43-9h3w-v976
Moderate severity vulnerability that affects puppet Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
3.2.4
Affected by 16 other vulnerabilities.
VCID-7ypq-wmb7-quhc
Aliases:
CVE-2014-3248
GHSA-92v7-pq4h-58j5
Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
3.6.2
Affected by 16 other vulnerabilities.
VCID-pdpa-qfpq-zkcq
Aliases:
CVE-2013-1655
GHSA-574q-fxfj-wv6h
Improper Input Validation Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
3.1.1
Affected by 16 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T15:18:22.807990+00:00 Ruby Importer Affected by VCID-5g6u-uvej-xbad https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-4761.yml 38.0.0
2026-04-01T15:18:22.673702+00:00 Ruby Importer Affected by VCID-7ypq-wmb7-quhc https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2014-3248.yml 38.0.0
2026-04-01T15:18:22.364568+00:00 Ruby Importer Affected by VCID-pdpa-qfpq-zkcq https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-1655.yml 38.0.0
2026-04-01T15:18:22.341514+00:00 Ruby Importer Affected by VCID-3kma-3ffw-8qd9 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml 38.0.0